Filters








21,327 Hits in 5.1 sec

Biometric User Authentication on Smart Cards by Means of Handwritten Signatures [chapter]

Olaf Henniger, Katrin Franke
2004 Lecture Notes in Computer Science  
The biometric data under consideration are handwritten signatures captured by means of a graphic tablet and a special pen.  ...  This paper describes a biometric method for user authentication on smart cards. Smart cards are chip cards with the ability for data processing directly on the card.  ...  Acknowledgements This research was supported by the German Federal Ministry of Education and Research within the project "Ascribability of actions in virtual worlds" (http://zavir.sit.fraunhofer.de).  ... 
doi:10.1007/978-3-540-25948-0_75 fatcat:pej6dzgkcbbzroptd6w7lbfgj4

Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks [chapter]

2009 Research and Development in Intelligent Systems XXVI  
This method is used for a biometric authentication system after the degrees of similarity between a signature and it's reference template are computed.  ...  This paper introduces a new method of combining the degrees of similarity for a hand-written signature (also known as holographic signature or biometric signature) using neural networks.  ...  process. • matching -an user tries to use the biometric system for authentication.  ... 
doi:10.1007/978-1-84882-983-1_37 dblp:conf/sgai/Marcu09 fatcat:xg46cj6warathns7ry2w3ismwi

Off-line signature verification by the tracking of feature and stroke positions

B. Fang, C.H. Leung, Y.Y. Tang, K.W. Tse, P.C.K. Kwok, Y.K. Wong
2003 Pattern Recognition  
For the purpose of comparison, two existing methods proposed by other researchers were implemented and tested on the same database.  ...  Given a signature to be veriÿed, the positional displacements are determined and the authenticity is decided based on the statistics of the training samples.  ...  Acknowledgements This research is supported by a research grant from the Hong Kong Research Grant Council, reference no. HKU7044=97E.  ... 
doi:10.1016/s0031-3203(02)00061-4 fatcat:vfebiwvjfbfm3p4mdzry2wnipy

Offline signature verification with generated training samples

B. Fang, C.H. Leung, Y.Y. Tang, P.C.K. Kwok, K.W. Tse, Y.K. Wong
2002 IEE Proceedings - Vision Image and Signal Processing  
The method differs from existing ones in that it is more suitable for the generation of signature samples.  ...  Besides this, a set of peripheral features, which is useful in describing both the internal and external structures of signatures, is employed to represent the signatures in the verification process.  ...  Acknowledgment This research has been supported by a research grant from the Hong Kong Research Grant Council, reference HKU7044/97€.  ... 
doi:10.1049/ip-vis:20020191 fatcat:mmuxp6dm75c7tb4kzjky5pgi5u

Multimedia document authentication using on-line signatures as watermarks

Anoop M. Namboodiri, Anil K. Jain, Edward J. Delp III, Ping W. Wong
2004 Security, Steganography, and Watermarking of Multimedia Contents VI  
The most popular methods used for authentication of digital documents are public key encryption-based authentication and digital watermarking.  ...  Authentication of digital documents is an important concern as digital documents are replacing the traditional paper-based documents for official and legal purposes.  ...  Acknowledgements We would like to thank Umut Uludag for many helpful discussions and suggestions.  ... 
doi:10.1117/12.531133 dblp:conf/sswmc/NamboodiriJ04 fatcat:4anqsywxpbahzoadgqewpg2thq

DWT Domain On-Line Signature Verification [chapter]

Isao Nakanishi, Shouta Koike, Yoshio Itoh, Shigang Li
2011 Biometrics  
verification performance tends to be degraded since the on-line signature is a dynamic trait.  ...  On the other hand, signatures with small DP distances are accepted even if they are forgery. The DP matching forces to match two signatures even if either is forgery. It increases false acceptance.  ...  Verification by DP matching Since on-line signatures have large intra-class variation, one-to-one matching cannot be applied in verification.  ... 
doi:10.5772/17486 fatcat:3rmchhro5rc4nopvqbqakxztqy

Offline Signature Verification for Authentication

Ranjan Jana, Saptashwa Mandal, Kunal Chhaya
2015 International Journal of Computer Applications  
A set of actual signatures is collected from individuals whose signatures have to be authenticated by the system. The topological and texture features are extracted from the actual signature set.  ...  Signature is strongly accepted in legally and socially as identification and authentication of a person's identity. But, it is very difficult to verify the signature physically.  ...  The authors are also thankful to all persons who have given the permission to use their signature images.  ... 
doi:10.5120/ijca2015906067 fatcat:tlc4uswp6vh33cch7db23q2kky

Surgery Agreement Signature Authentication System for Mobile Health Care

Jun-Ho Huh
2020 Electronics  
Thus, this study proposes a surgery consent signature authentication system for the mobile health care system.  ...  For the comparison, the segment matching, spatial pyramid matching, and boundary matching techniques were used in addition to the Dynamic Time Warping (DTW) algorithm.  ...  Boundary Matching Boundary matching is a method that draws several lines on a signature input window and determines the order and number of strokes crossing the lines for comparison purposes.  ... 
doi:10.3390/electronics9060890 fatcat:ww6lzwnylrdyphdlpir3ubkr3i

Simply Partitioned DP Matching and Threshold Equalizing in DWT Domain On-line Signature Verification

Isao Nakanishi, Shingo Nakatani, Shota Koike
2010 2010 12th International Conference on Frontiers in Handwriting Recognition  
In this paper, we introduce simply partitioned DP (dynamic programming) matching and threshold equalizing into the verification process in DWT (discrete wavelet transform) domain on-line signature verification  ...  The simply partitioned DP matching divides both data series (verification and template data) into several partitions and calculate sub DP distance every partition.  ...  Among various biometrics, only on-line signature is cancelable. Even if signature shape is known by others, it is possible to cope with the problem by changing the shape.  ... 
doi:10.1109/icfhr.2010.22 dblp:conf/icfhr/NakanishiNK10 fatcat:7466zehjizenrjj7f3gngydrkm

Securing Electronic Medical Records Using Biometric Authentication [chapter]

Stephen Krawczyk, Anil K. Jain
2005 Lecture Notes in Computer Science  
In order to improve the authentication performance, we combine information from both on-line signature and voice biometrics.  ...  On-line signature and voice modalities seem to be the most convenient for the users in such authentication systems because a tablet PC comes equipped with the associated sensors/hardware.  ...  Michael Zaroukian for providing us excellent guidance during the course of this project.  ... 
doi:10.1007/11527923_115 fatcat:r4wjpnfqjbfbniurzncj2ituha

A novel approach for Online signature verification using fisher based probabilistic neural network

Souham Meshoul, Mohamed Batouche
2010 The IEEE symposium on Computers and Communications  
Based on its results, a PNN model is constructed and used for matching purposes.  ...  In this paper, we propose a new approach for automatic authentication using dynamic signature.  ...  namely off-line methods and on-line methods [2] .  ... 
doi:10.1109/iscc.2010.5546760 dblp:conf/iscc/MeshoulB10 fatcat:j4i6di2gjnczxd3plgn4y3uiyu

Your signature is your password: Haptic Passwords on Mobile Devices [article]

Junjie Yan, Tamara Bonaci, Howard Jay Chizeck
2020 arXiv   pre-print
The performance of the model is evaluated based on authentication accuracies.  ...  The results suggest that this proposed haptic password system achieves robust high authentication accuracy and scalability, as well as forgery-proof performance.  ...  For example, as for the letter "t" in signature password, the same subject has two different stroke sequences: a) horizontal line followed by the " " shaped stroke; b) the " " shaped stroke followed by  ... 
arXiv:2010.14007v1 fatcat:yzfipurx6rgkjmer3hmj2mrzqe

Combining local, regional and global matchers for a template protected on-line signature verification system

Loris Nanni, Emanuele Maiorana, Alessandra Lumini, Patrizio Campisi
2010 Expert systems with applications  
In this work an on-line signature authentication system based on an ensemble of local, regional, and global matchers is presented.  ...  by means of its regional properties, and a Linear Programming Descriptor classifier trained by global features.  ...  Fierrez-Aguilar for the helpful discussions on on-line signature when he was a visiting researcher at the University of Bologna, Italy.  ... 
doi:10.1016/j.eswa.2009.10.023 fatcat:rlthbz2jsnafnotl5p36ryfjoy

OPTIMIZED MULTI MODEL SYSTEM FOR ONLINE SIGNATURE VERIFICATION

Poonam Chaudhary .
2016 International Journal of Research in Engineering and Technology  
Steps for verifying online handwritten signature in this system start with extracting dynamic data (x and y positions) of points that forming the signature.  ...  Further, during the matching phase, a different distance measuring algorithm has been implemented known as Minkowski distance which is helpful in improving the results.  ...  The matching method will be done by activity the Manhattan distance that is employed within the projected on-line signature verification system.  ... 
doi:10.15623/ijret.2016.0506036 fatcat:hcwtynm3lfgvxp56nrq5ca4dka

AUTOMATIC SIGNATURE VERIFICATION WITH CHAIN CODE USING WEIGHTED DISTANCE AND EUCLIDEAN DISTANCE - A REVIEW

Abhilash Deshmukh .
2016 International Journal of Research in Engineering and Technology  
It verifies the signature by performing a match with the pre-processed signature dynamically by detecting the motion of stylus during signature while on other hand, offline verifies by performing a match  ...  The signature forgery can be restricted by either online or offline signature verification techniques.  ...  Signature verification is one of the many methods that can be used for authentication of a person.  ... 
doi:10.15623/ijret.2016.0503045 fatcat:txa5hzhkyjhupham7fc4jejcgy
« Previous Showing results 1 — 15 out of 21,327 results